SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Politics : Formerly About Applied Materials -- Ignore unavailable to you. Want to Upgrade?


To: FJB who wrote (47920)6/14/2001 1:30:05 AM
From: Math Junkie  Read Replies (1) | Respond to of 70976
 
OT

Why does it have to be from some other web page? So far you haven't refuted anything in the one I linked to. You tell us that you find it "laughable," but you are unable or unwilling to explain why. I am not interested in going on a quest to try to prove a point. I'm neither long nor short Microsoft, and I have no horse in this race. You on the other hand, seem to want us to believe that he doesn't know what he is talking about, merely on your say so. I can't understand why you won't tell us what he said that was wrong and why it's wrong.



To: FJB who wrote (47920)6/14/2001 2:02:53 AM
From: Sun Tzu  Respond to of 70976
 
I hate to break up this lovefest, but as a former hacker and one who used to build firewalls in the early 90s (when you actually had to build them by hand), I can tell you that spoofing was a real problem. That spoofing is not as much a problem anymore is due to it being better understood. Most medium to large companies that I have been to have put up safe guards against it. But the small ones remain vulnurable.

For those who don't know, spoofing is the term used when computer "A" sends packets that look as if they originated from computer "B". The last spoofing attack that I personally witnessed was a couple of years ago. One of the network administrators had forgotten to close a door behind him and allowed ICMP Redirect. A hacker used spoofing to turn our entire network as a weapon against the WTO conference in Vancouver, BC (or may be it was the World Bank?). Basically what they did was pretend a WTO computer was asking "is there anybody out there". The replies from our computers were flooding the WTO systems.

On a related note, the fact that until a few years ago (still are?) Microsoft's Internet servers were Unix based. And the fact that to this day nobody uses a NT box as a firewall, should tell you how much understanding or concern MSFT has about security and how much the network security staff trust Windows.

regards,
Sun Tzu

PS You read up on all the variations of how spoofing and other tricks can make your life miserable at cert.org



To: FJB who wrote (47920)6/15/2001 1:07:25 PM
From: Math Junkie  Respond to of 70976
 
OT

"Can you give me a single example, not from that web page, of Win2000 screwing things up via "spoofing"?"

I don't know whether this post, and the links at the end of it, provide any such examples, but for those interested in this issue, they provide a variety of viewpoints on it:

counterpane.com

Thanks to calypso, of the Internet Security/Privacy Issues and Solutions thread, for providing the link.

Subject 33242